Browsing Computing Conference Papers by Subject "080303 Computer System Security"
Now showing items 21-30 of 30
-
The impact of wireless LAN security on performance for different windows operating systems
(Institute of Electrical and Electronics Engineers (IEEE), 2008-07-09)This paper investigates the impact of various encryption techniques (WEP-64, WEP-128 and WPA) on performance of wireless LANs for Windows operating systems (Windows Server 2003, Windows XP and Windows Vista) and for both ... -
The Influence of WPA2 Security on the UDP performance of IPv4 and IPv6 Using 802.11n WLAN in Windows 7-Windows 2008 environment
(Institute of Electrical and Electronics Engineers (IEEE), 2011-02-16)The impact of WPA2 security-bandwidth trade-off for IPv4 and IPv6 on wireless 802.11n network implementing Windows 7-Windows Server 2008 is investigated. The highest point of difference between open system and WPA2 for UDP ... -
Performance evaluation of virtual private network protocols in Windows 2003 environment
(Institute of Electrical and Electronics Engineers (IEEE), 2008-12-20)Virtual Private Network (VPN) is a technology that provides secure communication for data as it transits through insecure regions of information technology infrastructure. With prolific development of the Internet, businesses ... -
Portability of an RF fingerprint of a wireless transmitter
(IEEE CNS, 2014)In conventional wireless networks, security issues are primarily considered above the physical layer and are usually based on bit-level algorithms to establish the identity of a legitimate wireless device. Physical layer ... -
Portability of an RF fingerprint of a wireless transmitter
(2014-10)In conventional wireless networks, security issues are primarily considered above the physical layer and are usually based on bitlevel algorithms to establish the identity of a legitimate wireless device. Physical layer ... -
Radio Frequency fingerprinting and its challenges
(IEEE CNS, 2014)RF fingerprinting aims to develop a unique RF fingerprint for a wireless device that can be used as an identity, in the same way a biological fingerprint operates, to improve the security and privacy of wireless communication. ... -
SecTrust : a trust and recommendation system for Peer-2-Peer networks
(International Conference on Information Resources Management (CONF-IRM) at AIS Electronic Library (AISeL), 2018-06)The concept of Trust has been applied in many information systems such as e-commerce, social networks and smart grid networks. It is currently getting attention on the Internet of Things. The fundamental concept in Trust, ... -
Security in Virtual DMZ designs
(Global Business and Technology Association (New York), 2014-07)Virtualization as a technology has existed for almost three decades now. By emulating physical resources, virtualization enables to utilize the full capacity of their hardware resources. Traditional physical DMZs (demilitarized ... -
A survey on Internet usage and cybersecurity awareness in students
(2016-12)There has been an exponential increase in the usage of the internet, particularly among students since the introduction of e-learning and Bring Your Own Device (BYO) initiatives into the education system. In New Zealand ... -
Taxonomy of malware detection techniques
(Institute of Electrical and Electronics Engineers (IEEE), 2016-12)Malware is an international software disease. Research shows that the effect of malware is becoming chronic. To protect against malware detectors are fundamental to the industry. The effectiveness of such detectors depends ...